:: Volume 11, Issue 1 (9-2022) ::
منادی 2022, 11(1): 1-9 Back to browse issues page
Key Discovery and Forgery Attack on a Key Agreement Protocol with Authentication for Wireless Sensor Network
Amir Allahdadi Ghiyasabadi *1 , Javad Alizadeh1
1- Fat’h Science and Technology Center, Faculty and Research Institute of Computer Engineering and Cyber Power, Imam Hossein (AS) University, Tehran, Iran
Abstract:   (3209 Views)
With the development of new information and communication technologies such as developments related to Internet of Things applications, the importance of information and maintaining its security is more and more considered. Key agreement and authentication protocols play an important role in ensuring information security. One of the important components used in many applications of the Internet of Things is wireless sensor networks, whose security is ensured by using appropriate protocols of these networks. In 2020, Sikarwar and Das presented a key agreement protocol with authentication for wireless sensor networks and claimed that this protocol is secure against well-known attacks such as feedback attacks, password discovery, and man-in-the-middle attacks. In this paper, it is shown that the Sikarvar and DOS protocol is not secure and an attacker can easily obtain this key. In addition, it is shown that the protocol cannot be secure against password discovery and spoofing attacks.
Keywords: wireless sensor network, key agreement protocol with authentication, key discovery attack, forgery attack
Full-Text [PDF 942 kb]   (667 Downloads)    
Type of Study: Research Article | Subject: Special
Received: 2023/02/26 | Accepted: 2022/03/1 | Published: 2022/03/1


XML   Persian Abstract   Print



Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 11, Issue 1 (9-2022) Back to browse issues page